I registered just for this post lulz
@ The Game, TKIP is just the encryption not the authentication, I believe you were thinking about RADIUS, which cannot be attack in the same manner as PSK, or perhaps LEAP/EAP
@Barry, what happens is:
The AP waits for a client to connect, upon connecting he can instantly browse the internet, except for one small problem, via some nice grep skills, the program intercepts the GET's Responses ans delivers a broken page along side a: "<script>window.open(blah)</script>" that has one input field and one message, "We're sorry, due to ongoing technical difficulty, we require you to reenter your Wireless passphrase"
I have personally tested this tecnique on.... about 100 clients, 90 of which did it :D